Phishing dark waters the offensive and defensive sides of malicious emails
"An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the vie...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Indianapolis, IN
Wiley
[2015]
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-108522806 | ||
003 | DE-627-1 | ||
005 | 20241001123219.0 | ||
007 | cr uuu---uuuuu | ||
008 | 241001s2015 xx |||||o 00| ||eng c | ||
020 | |a 9781118958490 |c electronic bk. |9 978-1-118-95849-0 | ||
020 | |a 1118958497 |c electronic bk. |9 1-118-95849-7 | ||
020 | |a 9781118958483 |c electronic bk. |9 978-1-118-95848-3 | ||
020 | |a 1118958489 |c electronic bk. |9 1-118-95848-9 | ||
020 | |a 9781119183624 |9 978-1-119-18362-4 | ||
020 | |a 1119183626 |9 1-119-18362-6 | ||
035 | |a (DE-627-1)108522806 | ||
035 | |a (DE-599)KEP108522806 | ||
035 | |a (ORHE)9781118958483 | ||
035 | |a (DE-627-1)108522806 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a SOC |2 bisacsh | |
082 | 0 | |a 364.1632 |2 23 | |
100 | 1 | |a Hadnagy, Christopher |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Phishing dark waters |b the offensive and defensive sides of malicious emails |c Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke |
264 | 1 | |a Indianapolis, IN |b Wiley |c [2015] | |
264 | 4 | |c ©2015 | |
300 | |a 1 online resource |b color illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a "An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program. Phishing is a social engineering technique through email that deceives users into taking an action that is not in their best interest, but usually with the goal of disclosing information or installing malware on the victim's computer. Phishing Dark Waters explains the phishing process and techniques, and the defenses available to keep scammers at bay. Learn what a phish is, and the deceptive ways they've been used Understand decision-making, and the sneaky ways phishers reel you in Recognize different types of phish, and know what to do when you catch one Use phishing as part of your security awareness program for heightened protection Attempts to deal with the growing number of phishing incidents include legislation, user training, public awareness, and technical security, but phishing still exploits the natural way humans respond to certain situations. Phishing Dark Waters is an indispensable guide to recognizing and blocking the phish, keeping you, your organization, and your finances safe"--Publisher's description | ||
650 | 0 | |a Phishing | |
650 | 0 | |a Electronic mail messages | |
650 | 0 | |a Electronic mail systems | |
650 | 4 | |a Hameçonnage | |
650 | 4 | |a Courrier électronique | |
650 | 4 | |a electronic mail | |
650 | 4 | |a SOCIAL SCIENCE ; Criminology | |
650 | 4 | |a Electronic mail systems | |
650 | 4 | |a Electronic mail messages | |
650 | 4 | |a Phishing | |
700 | 1 | |a Fincher, Michele |e VerfasserIn |4 aut | |
700 | 1 | |a Dreeke, Robin |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781118958476 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781118958476 |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781118958483/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-108522806 |
---|---|
_version_ | 1818767365120196609 |
adam_text | |
any_adam_object | |
author | Hadnagy, Christopher Fincher, Michele |
author2 | Dreeke, Robin |
author2_role | ctb |
author2_variant | r d rd |
author_facet | Hadnagy, Christopher Fincher, Michele Dreeke, Robin |
author_role | aut aut |
author_sort | Hadnagy, Christopher |
author_variant | c h ch m f mf |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)108522806 (DE-599)KEP108522806 (ORHE)9781118958483 |
dewey-full | 364.1632 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.1632 |
dewey-search | 364.1632 |
dewey-sort | 3364.1632 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04091nam a22005772 4500</leader><controlfield tag="001">ZDB-30-ORH-108522806</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20241001123219.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">241001s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118958490</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-95849-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118958497</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-95849-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118958483</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-95848-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118958489</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-95848-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119183624</subfield><subfield code="9">978-1-119-18362-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119183626</subfield><subfield code="9">1-119-18362-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)108522806</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP108522806</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781118958483</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)108522806</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SOC</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.1632</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hadnagy, Christopher</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Phishing dark waters</subfield><subfield code="b">the offensive and defensive sides of malicious emails</subfield><subfield code="c">Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, IN</subfield><subfield code="b">Wiley</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield><subfield code="b">color illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program. Phishing is a social engineering technique through email that deceives users into taking an action that is not in their best interest, but usually with the goal of disclosing information or installing malware on the victim's computer. Phishing Dark Waters explains the phishing process and techniques, and the defenses available to keep scammers at bay. Learn what a phish is, and the deceptive ways they've been used Understand decision-making, and the sneaky ways phishers reel you in Recognize different types of phish, and know what to do when you catch one Use phishing as part of your security awareness program for heightened protection Attempts to deal with the growing number of phishing incidents include legislation, user training, public awareness, and technical security, but phishing still exploits the natural way humans respond to certain situations. Phishing Dark Waters is an indispensable guide to recognizing and blocking the phish, keeping you, your organization, and your finances safe"--Publisher's description</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Phishing</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic mail messages</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic mail systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hameçonnage</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Courrier électronique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">electronic mail</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">SOCIAL SCIENCE ; Criminology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic mail systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic mail messages</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Phishing</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fincher, Michele</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dreeke, Robin</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781118958476</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781118958476</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781118958483/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-108522806 |
illustrated | Illustrated |
indexdate | 2024-12-18T08:48:43Z |
institution | BVB |
isbn | 9781118958490 1118958497 9781118958483 1118958489 9781119183624 1119183626 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource color illustrations |
psigel | ZDB-30-ORH |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Wiley |
record_format | marc |
spelling | Hadnagy, Christopher VerfasserIn aut Phishing dark waters the offensive and defensive sides of malicious emails Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke Indianapolis, IN Wiley [2015] ©2015 1 online resource color illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record "An essential anti-phishing desk reference for anyone with an email address Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human decision-making and the impact of deliberate influence and manipulation on the recipient. With expert guidance, this book provides insight into the financial, corporate espionage, nation state, and identity theft goals of the attackers, and teaches you how to spot a spoofed e-mail or cloned website. Included are detailed examples of high profile breaches at Target, RSA, Coca Cola, and the AP, as well as an examination of sample scams including the Nigerian 419, financial themes, and post high-profile event attacks. Learn how to protect yourself and your organization using anti-phishing tools, and how to create your own phish to use as part of a security awareness program. Phishing is a social engineering technique through email that deceives users into taking an action that is not in their best interest, but usually with the goal of disclosing information or installing malware on the victim's computer. Phishing Dark Waters explains the phishing process and techniques, and the defenses available to keep scammers at bay. Learn what a phish is, and the deceptive ways they've been used Understand decision-making, and the sneaky ways phishers reel you in Recognize different types of phish, and know what to do when you catch one Use phishing as part of your security awareness program for heightened protection Attempts to deal with the growing number of phishing incidents include legislation, user training, public awareness, and technical security, but phishing still exploits the natural way humans respond to certain situations. Phishing Dark Waters is an indispensable guide to recognizing and blocking the phish, keeping you, your organization, and your finances safe"--Publisher's description Phishing Electronic mail messages Electronic mail systems Hameçonnage Courrier électronique electronic mail SOCIAL SCIENCE ; Criminology Fincher, Michele VerfasserIn aut Dreeke, Robin MitwirkendeR ctb 9781118958476 Erscheint auch als Druck-Ausgabe 9781118958476 TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781118958483/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Hadnagy, Christopher Fincher, Michele Phishing dark waters the offensive and defensive sides of malicious emails Phishing Electronic mail messages Electronic mail systems Hameçonnage Courrier électronique electronic mail SOCIAL SCIENCE ; Criminology |
title | Phishing dark waters the offensive and defensive sides of malicious emails |
title_auth | Phishing dark waters the offensive and defensive sides of malicious emails |
title_exact_search | Phishing dark waters the offensive and defensive sides of malicious emails |
title_full | Phishing dark waters the offensive and defensive sides of malicious emails Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke |
title_fullStr | Phishing dark waters the offensive and defensive sides of malicious emails Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke |
title_full_unstemmed | Phishing dark waters the offensive and defensive sides of malicious emails Christopher Hadnagy, Michele Fincher ; foreword by Robin Dreeke |
title_short | Phishing dark waters |
title_sort | phishing dark waters the offensive and defensive sides of malicious emails |
title_sub | the offensive and defensive sides of malicious emails |
topic | Phishing Electronic mail messages Electronic mail systems Hameçonnage Courrier électronique electronic mail SOCIAL SCIENCE ; Criminology |
topic_facet | Phishing Electronic mail messages Electronic mail systems Hameçonnage Courrier électronique electronic mail SOCIAL SCIENCE ; Criminology |
url | https://learning.oreilly.com/library/view/-/9781118958483/?ar |
work_keys_str_mv | AT hadnagychristopher phishingdarkwaterstheoffensiveanddefensivesidesofmaliciousemails AT finchermichele phishingdarkwaterstheoffensiveanddefensivesidesofmaliciousemails AT dreekerobin phishingdarkwaterstheoffensiveanddefensivesidesofmaliciousemails |